CompTIA Cloud+ Online Courses

CompTIA Cloud+ Bundle in Angola

CompTIA Cybersecurity Analyst (CSA+) is an international,
vendor-neutral cybersecurity certification that applies behavioural
analytics to improve the overall state of IT security. CSA+
validates critical knowledge and skills that are required to
prevent, detect and combat cybersecurity threats. As attackers have
learned to evade traditional signature-based solutions such as
firewalls, an analytics-based approach within the IT security
industry is increasingly important for most organizations. The
behavioural analytics skills covered by CSA+ identify and combat
malware, and advanced persistent threats (APTs), resulting in
enhanced threat visibility across a broad attack surface. 2KO's online
courses are also available as full-time instructor led courses in
Luanda, giving our students hands on skills to help prepare for
International IT certification exams. 2KO Africa provides IT consulting, Technical services and top-of-the-line IT training for multiple vendors. Our best-of-breed computer courses are offered either as instructor led classes or as online e-learning. from the comfort of home or work.

Price in Angolan Kwanza - as at 21 August

Kz 23,000

Module 1: Threat Management

1.1
Introduction

1.2 Given a
scenario, apply environmental reconnaissance techniques using
appropriate tools and processes - Part 1

1.3 Given a
scenario, apply environmental reconnaissance techniques using
appropriate tools and processes - Part 2

1.4 Given a
scenario, apply environmental reconnaissance techniques using
appropriate tools and processes - Part 3

1.5 Given a
scenario, apply environmental reconnaissance techniques using
appropriate tools and processes - Part 4

1.6 Given a
scenario, apply environmental reconnaissance techniques using
appropriate tools and processes - Part 5

1.7 Given a
scenario, apply environmental reconnaissance techniques using
appropriate tools and processes - Part 6

1.8 Given a
scenario, apply environmental reconnaissance techniques using
appropriate tools and processes - Part 7

1.9 Given a
scenario, apply environmental reconnaissance techniques using
appropriate tools and processes - Part 8

1.10 Given a
scenario, apply environmental reconnaissance techniques using
appropriate tools and processes - Part 9

1.11 Given a
scenario, analyze the results of a network reconnaissance - Part
1

1.12 Given a
scenario, analyze the results of a network reconnaissance - Part
2

1.13 Given a
scenario, analyze the results of a network reconnaissance - Part
3

1.14 Given a
scenario, analyze the results of a network reconnaissance - Part
4

1.15 Given a
scenario, analyze the results of a network reconnaissance - Part
5

1.16 Given a
network-based threat, implement or recommend the appropriate
response and countermeasure - Part 1

1.17 Given a
network-based threat, implement or recommend the appropriate
response and countermeasure - Part 2

1.18 Given a
network-based threat, implement or recommend the appropriate
response and countermeasure - Part 3

1.19 Given a
network-based threat, implement or recommend the appropriate
response and countermeasure - Part 4

1.20 Explain
the purpose of practices used to secure a corporate environment
- Part 1

1.21 Explain
the purpose of practices used to secure a corporate environment
- Part 2

1.22 Explain
the purpose of practices used to secure a corporate environment
- Part 3

1.23 Explain
the purpose of practices used to secure a corporate environment
- Part 4